Vulnerability Description
A remote code execution vulnerability exists within osCommerce Online Merchant version 2.3.4.1 due to insecure default configuration and missing authentication in the installer workflow. By default, the /install/ directory remains accessible after installation. An unauthenticated attacker can invoke install_4.php, submit crafted POST data, and inject arbitrary PHP code into the configure.php file. When the application later includes this file, the injected payload is executed, resulting in full server-side compromise.
Related Weaknesses (CWE)
References
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://www.exploit-db.com/exploits/44374
- https://www.oscommerce.com/
- https://www.vulncheck.com/advisories/oscommerce-installer-unauth-config-file-inj
FAQ
What is CVE-2018-25114?
CVE-2018-25114 is a documented vulnerability. A remote code execution vulnerability exists within osCommerce Online Merchant version 2.3.4.1 due to insecure default configuration and missing authentication in the installer workflow. By default, t...
How severe is CVE-2018-25114?
CVSS scoring is not yet available for CVE-2018-25114. Check NVD for updates.
Is there a patch for CVE-2018-25114?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.